博碩士論文 103423038 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:32 、訪客IP:18.118.32.213
姓名 韓翔陵(Hsiang-Ling Han)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 隱私機制對行動銀行使用意圖之研究
相關論文
★ 以個案研究法探討機械式組織之資訊系統導入★ 銀行企業內部網路導入TCP/IP通信協定之研究
★ 後金控時代臺灣地區金融服務業 薪資決策支援系統之設計研究 --以一家中型證券商為例★ 影響數位在職訓練之學習態度及行為意向研究
★ 台灣銀行業導入電子商務線上金流訊息標準之研究★ 國防訓儲軍士官制度評估
★ 以關係承諾角度探討組織中軟體專案開發之個案研究★ 企業工作流程再造之研究─以銀行發卡流程為例
★ 以個案研究法探討B2B電子商務導入之研究—以汽車售後服務件製造商為例★ 以個案研討方法探討公文簽核流程再造之研究- 以變更資訊部門服務為例
★ 半導體先進批次製程控制系統平台設計與實作★ 醫療資訊系統之資訊安全危安因素探討以台北某醫學中心為例
★ 資訊部門專案經理派遣人員之個案研究★ 綠色供應鏈管理資訊系統導入問題分析與探討-以A公司為例
★ 企業導入企業資源規劃(ERP)對作業流程之影響-以A公司為例★ 客訴處理電子化流程管理-以飲料業為例
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 隨著智慧型手機的用戶快速成長,行動網路普及率大增,越來越多的銀行業務都可
以透過手機來完成,也能夠提供客製化的服務給顧客。當銀行開始涉及每個人的生活時,
勢必需要存取客戶的隱私資訊,此時使用者是否願意分享隱私資料給銀行的問題也相對
受到重視。本研究透過行動銀行資訊分享模型(Mobile bank Information Sharing Model,
MBIS Model),探討當銀行提供不同的隱私機制時,是否能夠提升使用者對於隱私資訊
的分享意圖?研究方法根據隱私機制的不同而設計兩種問卷,調查對象為對金融產品、
銀行產業有初步認知者、且目前不願意分享個人的資訊隱私。
研究結果發現,透過隱私機制確實可以提升使用者對行動銀行的信任知覺以及降低
使用時的知覺風險態度,進而影響後續的使用意圖知覺,但不同的隱私機制有不同的效
果,提供隱私機制類別為「隱私賦權」會有較顯著的效果。期望本研究能夠在未來銀行
在推行行動服務時,提供適當的決策方向,降低顧客個人隱私資訊的顧慮,並提升對行
動銀行的使用意圖知覺。
摘要(英) Along with the rapid growth of smart phone users, mobile Internet penetration increased,
more and more of banking service can be done by smart phone, it can also provide customized
services to customers. When mobile bank began to touch everyone′s life, it will access the
customer′s private information, and in this time, it will be the important issue whether user is
willing to share the private information. In this study, sharing information through mobile
banking model (Mobile bank Information Sharing Model, MBIS Model), to explore when
banks offer different privacy mechanism, the user is able to enhance the privacy of
information shared intention? Methods depending on privacy mechanisms to design two kinds
of questionnaire survey for the subjects who is interesting in financial products, banking
industry, and unwilling to share personal information private.
The results found that through the mechanism of privacy can really enhance the user′s
trust perception and reduce perceived risk perception, indirect effecting subsequent intended
use perception, but different privacy mechanisms have different effects, providing privacy
mechanism category "Privacy empowerment" will be more significant effect. This study
expected when the mobile bank service will be implemented in the future, providing
appropriate policy direction, to reduce customer concerns about the privacy of personal
information, and to enhance the use of mobile banking intentions.
關鍵字(中) ★ 行動銀行
★ 隱私機制
★ 資訊隱私顧慮
關鍵字(英) ★ Mobile Banking
★ Privacy mechanism
★ Information privacy concerns
論文目次 摘要 ............................................................................................................................................. i
Abstract ....................................................................................................................................... ii
第一章 緒論 .............................................................................................................................. 1
1-1 研究背景與動機 ......................................................................................................... 1
1-2 研究重要性 ................................................................................................................. 5
1-3 研究目的與問題 ......................................................................................................... 6
1-4 論文章節 ..................................................................................................................... 7
第二章 文獻探討 ...................................................................................................................... 8
2-1 銀行的演進 ................................................................................................................. 8
2-2 行動銀行 ................................................................................................................... 12
2-3 資訊隱私顧慮 ........................................................................................................... 19
2-4 信任知覺及知覺風險態度 ....................................................................................... 23
2-5 隱私機制 ................................................................................................................... 28
第三章 研究方法 .................................................................................................................... 33
3-1 研究架構 ................................................................................................................... 33
3-2 研究假說 ................................................................................................................... 34
3-3 變數的操作型定義與衡量 ....................................................................................... 38
3-4 調查對象與問卷設計 ............................................................................................... 43
3-5 資料分析方法 ........................................................................................................... 44
第四章 資料分析 .................................................................................................................... 46
4-1 前測樣本回收與資料分析 ....................................................................................... 46
4-2 問卷發放與回收 ....................................................................................................... 51
4-3 問卷樣本之統計與信效度分析 ............................................................................... 52
4-4 結構模型分析 ........................................................................................................... 54
4-5 使用者族群之差異分析 ........................................................................................... 60
第五章 結論與建議 ................................................................................................................ 62
5-1 研究結論 ................................................................................................................... 62
5-2 管理意涵 ................................................................................................................... 65
5-3 研究限制 ................................................................................................................... 66
5-4 研究方向 ................................................................................................................... 66
參考文獻 .................................................................................................................................. 68
附錄 問卷內容 ........................................................................................................................ 74
參考文獻 68

參考文獻
一、 英文部分
[1] Ajzen, I. and M. Fishbein (1980). "Understanding attitudes and predicting social
behaviour."

[2] Baird, I. S. and H. Thomas (1985). "Toward a contingency model of strategic risk
taking." Academy of Management review 10(2): 230-243.

[3] Bauer, R. (1960). Consumer Behavior as Risk Taking. W: Dynamic Marketing for a
Changing World. Red. RS Hancock. Proceedings of the 43rd Conference of the
American Marketing Association, Chicago.

[4] Byrne, B. M., R. J. Shavelson and B. Muthén (1989). "Testing for the equivalence of
factor covariance and mean structures: The issue of partial measurement invariance."
Psychological bulletin 105(3): 456.

[5] Chaudhuri, A. and M. B. Holbrook (2001). "The chain of effects from brand trust and
brand affect to brand performance: the role of brand loyalty." Journal of marketing 65(2):
81-93.

[6] Chou, C.-P. and P. M. Bentler (1995). "Estimates and tests in structural equation
modeling."

[7] Cox, D. F. (1964). " Perceived Risk and Consumer Decision-Making: The Case of
Telephone Shopping" Journal of marketing research 1(4): 32-39.

[8] D Harrison McKnight, N. L. C. (2001). "What trust means in e-commerce customer
relationships: an interdisciplinary conceptual typology." International Journal of
Electronic Commerce 6(2): 35-59.

[9] Dowling, G. R. and R. Staelin (1994). "A model of perceived risk and intended
risk-handling activity." Journal of consumer research: 119-134.
69

[10] Fornell, C. and D. F. Larcker (1981). "Structural equation models with unobservable
variables and measurement error: Algebra and statistics." Journal of marketing research:
382-388.

[11] Gormley, K. (1992). "One hundred years of privacy." Wis. L. Rev.: 1335.

[12] Guilford, J. (1965). Fundamental statistics in psychology and education 4th Ed.

[13] Hair, J. F., W. C. Black, B. J. Babin, R. E. Anderson and R. L. Tatham (2006).
Multivariate data analysis, Pearson Prentice Hall Upper Saddle River, NJ.

[14] Hetcher, S. A. (2001). "Norm Proselytizers Create a Privacy Entitlement in Cyberspace."
Berkeley Technology Law Journal: 877-935.

[15] Hoffman, D. L., T. P. Novak and M. Peralta (1999). "Building consumer trust online."
Communications of the ACM 42(4): 80-85.

[16] Hourahine, B. and M. Howard (2004). "Money on the move: Opportunities for financial
service providers in the ‘third space’." Journal of Financial Services Marketing 9(1):
57-67.

[17] Jaccard, J. and R. Turrisi (2003). Interaction effects in multiple regression, Sage.

[18] Jacoby, J. and L. B. Kaplan (1972). "The components of perceived risk." Advances in
consumer research 3(3): 382-383.

[19] Jarvenpaa, S. L., N. Tractinsky and L. Saarinen (1999). "Consumer trust in an internet
store: a cross‐cultural validation." Journal of Computer‐Mediated Communication 5(2):
0-0.

[20] Jöreskog, K. G. and D. Sörbom (1989). LISREL 7: A guide to the program and
applications, Spss.

[21] Kimery, K. M. and M. McCord (2002). "Third-party assurances: Mapping the road to
trust in e-retailing." JITTA: Journal of Information Technology Theory and Application
4(2): 63.

[22] Koufaris, M. and W. Hampton-Sosa (2004). "The development of initial trust in an
online company by new customers." Information & management 41(3): 377-397. 70

[23] Lauer, T. W. and X. Deng (2007). "Building online trust through privacy practices."
International Journal of Information Security 6(5): 323-331.

[24] Malhotra, N. K., S. S. Kim and J. Agarwal (2004). "Internet users′ information privacy
concerns (IUIPC): The construct, the scale, and a causal model." Information Systems
Research 15(4): 336-355.

[25] Mayer, R. C., J. H. Davis and F. D. Schoorman (1995). "An integrative model of
organizational trust." Academy of Management review 20(3): 709-734.

[26] McCallister, E., T. Grance and K. Scarfone (2010). Guide to protecting the
confidentiality of personally identifiable information (PII).

[27] McKnight, D. H., L. L. Cummings and N. L. Chervany (1998). "Initial trust formation in
new organizational relationships." Academy of Management review 23(3): 473-490.

[28] Mitchell, V.-W. and M. Greatorex (1993). "Risk perception and reduction in the purchase
of consumer services." Service Industries Journal 13(4): 179-200.

[29] Nowak, G. J. and J. Phelps (1995). "Direct marketing and the use of individual‐level
consumer information: Determining how and when “privacy” matters." Journal of Direct
Marketing 9(3): 46-60.

[30] Nunnally, J. (1978). Psychometric methods, New York: McGraw-Hill.

[31] Park, D.-H., J. Lee and I. Han (2007). "The effect of on-line consumer reviews on
consumer purchasing intention: The moderating role of involvement." International
Journal of Electronic Commerce 11(4): 125-148.

[32] Pavlou, P. A. (2003). "Consumer acceptance of electronic commerce: Integrating trust
and risk with the technology acceptance model." International Journal of Electronic
Commerce 7(3): 101-134.

[33] Phelps, J., G. Nowak and E. Ferrell (2000). "Privacy concerns and consumer willingness
to provide personal information." Journal of Public Policy & Marketing 19(1): 27-41.

[34] Reichheld, F. F. and P. Schefter (2000). "E-loyalty: Your secret weapon on the Web."
Harvard business review 78(4): 105-113 71

[35] Schiffman, L. G., H. Hansen and L. L. Kanuk (2008). Consumer behaviour: A European
outlook, Pearson Education.

[36] Smith, H. J., S. J. Milberg and S. J. Burke (1996). "Information privacy: measuring
individuals′ concerns about organizational practices." MIS Quarterly: 167-196.

[37] Stone, R. N. and K. Grønhaug (1993). "Perceived risk: Further considerations for the
marketing discipline." European Journal of Marketing 27(3): 39-50.

[38] Suh, B. and I. Han (2003). "Effect of trust on customer acceptance of Internet banking."
Electronic Commerce research and applications 1(3): 247-263.

[39] Thomas, K. W. and B. A. Velthouse (1990). "Cognitive elements of empowerment: An
“interpretive” model of intrinsic task motivation." Academy of Management review
15(4): 666-681.

[40] Van Dyke, T. P., V. Midha and H. Nemati (2007). "The effect of consumer privacy
empowerment on trust and privacy concerns in e‐commerce." Electronic Markets 17(1):
68-81.

[41] Venkatesh, V., M. G. Morris, G. B. Davis and F. D. Davis (2003). "User acceptance of
information technology: Toward a unified view." MIS Quarterly: 425-478.

[42] Wang, H., M. K. Lee and C. Wang (1998). "Consumer privacy concerns about Internet
marketing." Communications of the ACM 41(3): 63-70.

[43] Wang, Y.-S., Y.-M. Wang, H.-H. Lin and T.-I. Tang (2003). "Determinants of user
acceptance of Internet banking: an empirical study." International Journal of Service
Industry Management 14(5): 501-519.

[44] Warren, S. D. and L. D. Brandeis (1890). "The right to privacy." Harvard law review:
193-220.

[45] Westin, A. F. (1968). "Privacy and freedom." Washington and Lee Law Review 25(1):
166.

[46] Wu, J.-H. and S.-C. Wang (2005). "What drives mobile commerce?: An empirical
evaluation of the revised technology acceptance model." Information & management
42(5): 719-729. 72


[47] Yousafzai, S. Y., J. G. Pallister and G. R. Foxall (2003). "A proposed model of e-trust for
electronic banking." Technovation 23(11): 847-860.

[48] Zolin, R., P. J. Hinds, R. Fruchter and R. E. Levitt (2004). "Interpersonal trust in
cross-functional, geographically distributed work: A longitudinal study." Information and
organization 14(1): 1-26.


二、 中文部分
[1] 王振浩,"影響消費者採用網路銀行行為意向之因素研究",國立中央大學,碩士論
文,民國 90 年。

[2] 任文瑗、范錚強 和 許通安,"資訊隱私侵害行為意圖之研究.",資訊,科技與社會
6(2), 77〜100 頁,民國 95 年。

[3] 江怡慧 和 陳怡樺,"網路銀行使用者之行為分析",產業金融季刊, 107,民國 89
年。

[4] 吳佩芬,"BANK 3.0 銀行未來式-透過行動銀行線上開立存款帳戶可行性之探討
[以第一銀行為例].",國立中央大學,碩士論文,民國 104 年。

[5] 李俊磊,"網站隱私權政策分析-以台灣網站為例.",國立政治大學,碩士論文,民
國 92 年。

[6] 邱皓政,量化研究與統計分析,五南圖書出版股份有限公司,台北市,民國 92 年。

[7] 張薰尹,"網際網路銀行與傳統銀行差異之研究: 以交易成本觀點探討之.",文化大
學,碩士論文,民國 89 年。

[8] 陳建源,"制度信任知覺, 認知有用性, 認知易用性對消費者使用意圖知覺之影響—
以行動商務為例.",國立成功大學,碩士論文,民國 98 年。

[9] 黃芳銘,社會科學統計方法學: 結構方程模式,五南圖書出版股份有限公司,台北
市,民國 93 年。

[10] 賴冠名,"使用者資訊隱私顧慮和網站引司機制對信任知覺的影響─ 以 Facebook 台灣使用者為例",國立中央大學,碩士論文,民國 99 年。

[11] BRETT KING,BANK3.0 銀行轉型未來式,孫一仕,施祖琪,蕭俊傑 譯,二版,財
團法人台灣金融研訓院發行,民國 104 年。

[12] 吳珮華,"行動銀行之研究",台北市,民國 102 年。

[13] Chris Skinner,DIGITAL BANK 數位銀行,孫一仕 譯,財團法人台灣金融研訓院
發行,民國 103 年。

[14] Bruce Schneier,當信任崩壞:密碼學專家告訴你,如何面對社會中的貪婪與背叛,
防範信任機制的全球大失靈,洪慧芳 譯,漫遊者文化事業股份有限公司,民國 104
年。

[15] 台灣網路資訊中心:『2015 年台灣寬頻網路使用調查報告』,2015 年,取自
http://www.twnic.net.tw/download/200307/20150901e.pdf

[16] 資策會創研所(FIND):台灣地區使用行動裝置上網數據調查,2015 年,取自
http://www.iii.org.tw/Press/NewsDtl.aspx?nsp_sqno=1367&fm_sqno=14

[17] 金管會:「打造數位化金融環境 3.0」推動情形,2015 年,取自
http://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp
&dataserno=201502100002&toolsflag=Y&dtable=News

[18] 第一銀行_第 e 個網:網路銀行之提供功能,2015 年,取自
https://www.firstbank.com.tw/A2_3_1.action

[19] 台灣金融研訓院:落實金融 3.0 建構數位銀行資訊發展策略,2015,取自
https://www-950.ibm.com/events/wwe/grp/grp023.nsf/vLookupPDFs/03_1106_Digital_
Bank_Case_Study_Workshop_Hong_Wu/$file/03_1106_Digital_Bank_Case_Study_Wo
rkshop_Hong_Wu.pdf
指導教授 范懿文、蘇雅惠 審核日期 2016-6-13
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明